General

  • Target

    6c54e110dd29f082ce13dcd1e2a4ac2a700cc8b7c1bb51afe84ebad355e3689a

  • Size

    1.3MB

  • Sample

    221125-yrtx1sef8t

  • MD5

    7282dde8f4e69bf9a0052619e9437f75

  • SHA1

    ab5318514627783e106c108ae1f530f0b7b9f643

  • SHA256

    6c54e110dd29f082ce13dcd1e2a4ac2a700cc8b7c1bb51afe84ebad355e3689a

  • SHA512

    971d08fa409d5f5f7f02bd6f7f2eddea0056bf295764b41e1dfcbcb2429c066766719e7fd78fb772e3a71c0cce78b65b399a5b03214d3bb55cda6cb7b68da2fa

  • SSDEEP

    24576:Dx7ByxTiTzAsAvRTHCNsPLkNiY2shReIXE9G06EJGmx59igUWekaFaqi652l:97IiYsQRhT6iY2shR7XP0DUmx5YgUTkh

Malware Config

Extracted

Family

bandook

C2

bandar123.ddns.net

Targets

    • Target

      factura 009824.exe

    • Size

      1.6MB

    • MD5

      752e301ae1f726fd98279c779a31ef2e

    • SHA1

      b2dca2b0913cbdc98d652917adcd157c778957c0

    • SHA256

      bd318d45e08bceab9470b1cfec2e8a9e70c790daff0770a6bb60682653ac9480

    • SHA512

      aaac35a116456d1a06c4e491265fab870ea41b28cdb35d93ba94276b75e1a418754fc9b3f35917ead90ef3959a7c3fab032a69298a8d0c0da6c2d949ad5d9fdd

    • SSDEEP

      49152:ploCs/JrR6MYq4jRUiXXFpBdftBYxnbmFVpQhaYG:plOR96MR4VjLQnbUVpiG

    • Bandook RAT

      Bandook is a remote access tool written in C++ and shipped with a loader written in Delphi.

    • Bandook payload

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Virtualization/Sandbox Evasion

1
T1497

Tasks